Sample adjust evasion: IDS typically count on 'pattern matching' to detect an attack. By altering the data Employed in the assault a bit, it might be achievable to evade detection. As an example, an Internet Message Obtain Protocol (IMAP) server can be susceptible to a buffer overflow, and an IDS is ready to detect the attack signature of ten wides